Static task
static1
Behavioral task
behavioral1
Sample
ead05772aef841c6559a26bd3f63bb7104ed2388512666eb1e8000666ed62176.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ead05772aef841c6559a26bd3f63bb7104ed2388512666eb1e8000666ed62176.exe
Resource
win10v2004-20220812-en
General
-
Target
ead05772aef841c6559a26bd3f63bb7104ed2388512666eb1e8000666ed62176
-
Size
531KB
-
MD5
40be8bf19db0753ded219ad493baee6b
-
SHA1
1def97ccd49f044784a76029e0de3ab2f3735fa9
-
SHA256
ead05772aef841c6559a26bd3f63bb7104ed2388512666eb1e8000666ed62176
-
SHA512
179fd783c0f0dc34ba91da72f83d5d7c5b4357045b4d4d2687931a9d8f1765ce68610f42c9695b88bcefeb398e147e5b632401a8897cbd384ef32b6f10a987eb
-
SSDEEP
6144:VZjBxXIaC+KVlXtAOzcJtBrwI7mL80MLS4n4PvWmvbVjv6O4qEilGXr96GpG4mUz:VhXShV5t8tBEIypPvDhjvG79pG4NgEp
Malware Config
Signatures
Files
-
ead05772aef841c6559a26bd3f63bb7104ed2388512666eb1e8000666ed62176.exe windows x86
ff06c14e092f6efe6f7510e732d32381
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExW
CreateWindowExA
WindowFromPoint
WaitMessage
VkKeyScanW
UpdateWindow
UnregisterClassW
GetProcessDefaultLayout
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
SetWindowsHookExW
SetWindowsHookExA
SetWindowTextW
SetWindowTextA
SetWindowPos
SetWindowPlacement
SetWindowLongW
SetWindowLongA
SetTimer
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetParent
SetMenuItemInfoW
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetClipboardData
SetClassLongA
SetCapture
SetActiveWindow
SendMessageW
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassW
RegisterClassA
RedrawWindow
PtInRect
PostQuitMessage
PostMessageW
PostMessageA
PeekMessageW
PeekMessageA
OpenClipboard
OffsetRect
OemToCharA
MsgWaitForMultipleObjects
MessageBoxW
MessageBoxA
MessageBeep
MapWindowPoints
MapVirtualKeyW
MapVirtualKeyA
LoadStringA
LoadKeyboardLayoutA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsWindow
IsRectEmpty
IsIconic
IsDialogMessageW
IsDialogMessageA
IsChild
InvalidateRect
IntersectRect
InsertMenuItemA
InsertMenuA
InflateRect
GetWindowThreadProcessId
GetWindowTextLengthW
GetWindowTextW
GetWindowTextA
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowLongA
GetWindowDC
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetMessagePos
GetMenuStringW
GetMenuStringA
GetMenuState
GetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutNameA
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextW
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursor
GetClipboardData
GetClientRect
GetClassNameW
GetClassNameA
GetClassLongA
GetClassInfoW
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
ExitWindowsEx
EqualRect
EnumWindows
EnumThreadWindows
EnumChildWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextW
DrawTextA
DrawMenuBar
DrawIconEx
DrawIcon
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcW
DefWindowProcA
DefMDIChildProcW
DefMDIChildProcA
DefFrameProcW
DefFrameProcA
CreatePopupMenu
CreateMenu
CreateMDIWindowW
CreateIcon
CloseClipboard
ClientToScreen
ChildWindowFromPoint
CheckMenuItem
CharUpperBuffW
CharPrevW
CharNextW
CharLowerBuffW
CallWindowProcW
CallWindowProcA
CallNextHookEx
BringWindowToTop
BeginPaint
AttachThreadInput
CharPrevA
CharNextA
CharLowerBuffA
CharLowerA
CharUpperBuffA
CharToOemA
AdjustWindowRectEx
ActivateKeyboardLayout
GetTitleBarInfo
GetAncestor
GetWindow
GetParent
GetKeyboardType
shell32
SHGetPathFromIDListA
ShellExecuteW
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteA
ole32
CoCreateGuid
StringFromGUID2
CoTaskMemFree
ProgIDFromCLSID
StringFromCLSID
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitialize
CoTaskMemAlloc
advapi32
AdjustTokenPrivileges
EqualSid
FreeSid
GetTokenInformation
LookupPrivilegeValueA
OpenProcessToken
OpenThreadToken
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegFlushKey
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
DecryptFileW
AllocateAndInitializeSid
wininet
InternetReadFile
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
comctl32
ord17
ImageList_Destroy
ImageList_GetImageCount
ImageList_SetImageCount
ImageList_Add
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_Draw
ImageList_Replace
ImageList_DrawEx
ImageList_Remove
ImageList_BeginDrag
ImageList_EndDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_GetDragImage
ImageList_Read
ImageList_Write
ImageList_GetIconSize
ImageList_SetIconSize
_TrackMouseEvent
ImageList_Create
version
VerQueryValueW
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
GetFileVersionInfoW
GetFileVersionInfoA
kernel32
WaitForSingleObject
VirtualQuery
VirtualProtect
VirtualAlloc
SizeofResource
SetThreadLocale
SetLastError
SetFilePointer
SetEvent
SetErrorMode
SetEndOfFile
ResumeThread
ResetEvent
ReleaseMutex
ReadFile
MultiByteToWideChar
MulDiv
LockResource
LocalFree
LoadResource
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalLock
GlobalGetAtomNameA
GlobalFree
GlobalFindAtomA
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomA
GetVersionExA
GetVersion
GetUserDefaultLangID
GetTickCount
GetThreadLocale
GetTempPathW
GetTempPathA
GetStringTypeExW
GetStringTypeExA
GetStdHandle
GetProcAddress
GetPrivateProfileStringA
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFullPathNameW
WideCharToMultiByte
GetFileAttributesW
InterlockedDecrement
GetExitCodeThread
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetComputerNameA
GetCommandLineW
GetCPInfo
GetACP
FreeResource
FreeLibrary
FormatMessageW
FormatMessageA
FindResourceA
FindFirstFileW
FindFirstFileA
FindClose
EnumCalendarInfoA
EnterCriticalSection
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateMutexA
CreateFileW
CreateFileA
CreateEventA
CreateDirectoryW
CreateDirectoryA
CompareStringW
CompareStringA
CancelTimerQueueTimer
GetSystemDirectoryA
SetConsoleTextAttribute
LocalCompact
lstrcpyA
DeleteTimerQueue
GetCurrentProcessId
OpenProcess
VirtualAllocEx
CloseHandle
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
WriteFile
WritePrivateProfileStringA
lstrcmpA
lstrlenW
LocalAlloc
TlsGetValue
TlsSetValue
GetFileType
GetFileSize
RaiseException
RtlUnwind
UnhandledExceptionFilter
ExitThread
ExitProcess
GetCommandLineA
GetStartupInfoA
LoadLibraryExA
lstrcpynA
lstrlenA
VirtualFree
Sleep
GetTimeFormatA
GetSystemTimeAsFileTime
GetFullPathNameA
InterlockedIncrement
QueryPerformanceCounter
LCMapStringA
LCMapStringW
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsAlloc
TlsFree
HeapFree
GetTimeZoneInformation
HeapAlloc
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetHandleCount
GetFileAttributesA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
HeapSize
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 121KB - Virtual size: 306KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ